Thanks Felipe Gasper
* PR #126: Link with libldns.la in Makefile.in.
Thanks orbea
- * PR #127: Addes option -Q to drill to give short answer.
+ * PR #127: Added option -Q to drill to give short answer.
Thanks niknah
* PR #133: Update m4 files for python modules.
Thanks Petr Menšík
Thanks William King
* Use OpenSSL DANE functions for verification (unless explicitly
disabled with --disable-dane-ta-usage).
- * Bumb .so version
+ * Bump .so version
* Include OPENPGPKEY RR type by default
* rdata processing for SMIMEA RR type
* Fix crash in displaying TLSA RR's.
* bugfix #505: Manpage and usage output fixes (Thanks Tomas Hozza)
* Adjust ldns_sha1() so that the input data is not modified (Thanks
Marc Buijsman)
- * Messages to stderr are now off by default and can be reenabled with
+ * Messages to stderr are now off by default and can be re-enabled with
the --enable-stderr-msgs configure option.
1.6.16 2012-11-13
* --enable-gost : use the GOST algorithm (experimental).
* Added some missing options to drill manpage
* Some fixes to --without-ssl option
- * Fixed quote parsing withing strings
+ * Fixed quote parsing within strings
* Bitmask fix in EDNS handling
* Fixed non-fqdn domain name completion for rdata field domain
names of length 1
* -r was killed in favor of -o <header bit mnemonic> which
allows for a header bits setting (and maybe more in the
future)
- * DNSSEC is never automaticaly set, even when you query
+ * DNSSEC is never automatically set, even when you query
for DNSKEY/RRSIG or DS.
* Implement a crude RTT check, it now distinguishes between
reachable and unreachable.
* char *_when was removed from the ldns_pkt structure
18 Oct 2005: 1.0.0: ldns-team
- * Commited a patch from Håkan Olsson
+ * Committed a patch from Håkan Olsson
* Added UPDATE support (Jakob Schlyter and Håkan Olsson)
* License change: ldns is now BSD licensed
* ldns now depends on SSL
23 May 2005: 0.60: ldns-team
* Removed config.h from the header installed files
- (you're not supposed to include that in a libary)
+ (you're not supposed to include that in a library)
* Further tweaking
- DNSSEC signing/verification works
- Assorted bug fixes and tweaks (memory management)
*
* dname specific rdata implementations
* A dname is a rdf structure with type LDNS_RDF_TYPE_DNAME
- * It is not a /real/ type! All function must therefor check
+ * It is not a /real/ type! All function must therefore check
* for LDNS_RDF_TYPE_DNAME.
*
* a Net::DNS like library for C
nsec3_ents (where ent is e.n.t.; i.e. empty non terminal) will
hold the NSEC3s that still didn't have a matching name in the
zone tree, even after all names were read. They can only match
- after the zone is equiped with all the empty non terminals. */
+ after the zone is equipped with all the empty non terminals. */
ldns_rbtree_t todo_nsec3_ents;
ldns_rbnode_t *new_node;
ldns_rr_list* todo_nsec3_rrsigs = ldns_rr_list_new();
my_ttl = ldns_rr_ttl(cur_rr);
}
/* When ttl is implicit, try to adhere to the rules as
- * much as posssible. (also for compatibility with bind)
+ * much as possible. (also for compatibility with bind)
* This was changed when fixing an issue with ZONEMD
* which hashes the TTL too.
*/
its cryptography.
</t>
<t>
-As said, lDNS is modelled after Net::DNS, therefor its application API
+As said, lDNS is modelled after Net::DNS, therefore its application API
looks very much like the one used for Net::DNS. Some modification are made
of course, because not all functionality of Perl can be caught in C.
</t>
its cryptography.
</t>
<t>
-As said, lDNS is modelled after Net::DNS, therefor its application API
+As said, lDNS is modelled after Net::DNS, therefore its application API
looks very much like the one used for Net::DNS. Some modification are made
of course, because not all functionality of Perl can be caught in C.
</t>
.TH ldns-testns 1 "14 Dec 2006"
.SH NAME
ldns-testns \- simple fake nameserver tool
-.SH SYNOPSYS
+.SH SYNOPSIS
.B ldns-testns
[
.IR OPTION
.SH DESCRIPTION
\fBldns-testns\fR can be used to provide answers to DNS queries for
testing. The answers are premade, and can be tailored to testing
-needs. The answers can be wildly invalid or unparseable.
+needs. The answers can be wildly invalid or unparsable.
This program is a debugging aid. It is not efficient, especially
with a long config file, but it can give any reply to any query.
usage(stdout);
exit(EXIT_FAILURE);
} else {
- fprintf(stderr, "quiting after %d qs\n", (int)maxcount);
+ fprintf(stderr, "quitting after %d qs\n", (int)maxcount);
}
} else {
fprintf(stderr, "Use -Number for max count\n");
/** CA constraint */
LDNS_TLSA_USAGE_PKIX_TA = 0,
LDNS_TLSA_USAGE_CA_CONSTRAINT = 0,
- /** Sevice certificate constraint */
+ /** Service certificate constraint */
LDNS_TLSA_USAGE_PKIX_EE = 1,
LDNS_TLSA_USAGE_SERVICE_CERTIFICATE_CONSTRAINT = 1,
/** Trust anchor assertion */
* be taken into account separately.
*
* \param[in] zone the zone in which to mark the names
- * \return LDNS_STATUS_OK on succesful completion, an error code otherwise
+ * \return LDNS_STATUS_OK on successful completion, an error code otherwise
*/
ldns_status
ldns_dnssec_zone_mark_glue(ldns_dnssec_zone *zone);
* after the keyword + k_del until we hit d_del
* \param[in] f file pointer to read from
* \param[in] keyword keyword to look for
- * \param[in] k_del keyword delimeter
+ * \param[in] k_del keyword delimiter
* \param[out] data the data found
- * \param[in] d_del the data delimeter
+ * \param[in] d_del the data delimiter
* \param[in] data_limit maximum size the the data buffer
* \return the number of character read
*/
* after the keyword + k_del until we hit d_del
* \param[in] f file pointer to read from
* \param[in] keyword keyword to look for
- * \param[in] k_del keyword delimeter
+ * \param[in] k_del keyword delimiter
* \param[out] data the data found
- * \param[in] d_del the data delimeter
+ * \param[in] d_del the data delimiter
* \param[in] data_limit maximum size the the data buffer
* \param[in] line_nr pointer to an integer containing the current line number (for
debugging purposes)
* after the keyword + k_del until we hit d_del
* \param[in] b buffer pointer to read from
* \param[in] keyword keyword to look for
- * \param[in] k_del keyword delimeter
+ * \param[in] k_del keyword delimiter
* \param[out] data the data found
- * \param[in] d_del the data delimeter
+ * \param[in] d_del the data delimiter
* \param[in] data_limit maximum size the the data buffer
* \return the number of character read
*/
%endif\r
\r
%description\r
-ldns is a library with the aim to simplify DNS programing in C. All\r
+ldns is a library with the aim to simplify DNS programming in C. All\r
lowlevel DNS/DNSSEC operations are supported. We also define a higher\r
level API which allows a programmer to (for instance) create or sign\r
packets.\r
/* first, try query match */
- /* special case for unparseable queries */
+ /* special case for unparsable queries */
if (!qp) {
if (strncmp(query_match, "BADPACKET\n", 11) == 0 ||
strncmp(query_match, "*\n", 3) == 0
/* ok the query matches, now look at both answers */
/* special case if one packet is null (ie. one server
- answers and one doesnt) */
+ answers and one doesn't) */
if (same && (!pkt1 || !pkt2)) {
if (strncmp(answer_match, "NOANSWER\n", 10) == 0 ||
strncmp(answer_match, "*\n", 3) == 0
return LDNS_STATUS_DDD_OVERFLOW;
}
} else {
- /* an espaced character, like \<space> ?
+ /* an escaped character, like \<space> ?
* remove the '\' keep the rest */
*p = *++s;
(*length)++;
return false;
}
/* ok, still alive - check if the rr already
- * exists - if so, dont' add it */
+ * exists - if so, don't add it */
for(i = 0; i < rr_count; i++) {
if(ldns_rr_compare(
ldns_rr_list_rr(rr_list, i), rr) == 0) {
* return a specific rdf
* \param[in] type type of RR
* \param[in] rr the rr itself
- * \param[in] pos at which postion to get it
+ * \param[in] pos at which position to get it
* \return the rdf sought
*/
static ldns_rdf *
* \param[in] type type of RR
* \param[in] rr the rr itself
* \param[in] rdf the rdf to set
- * \param[in] pos at which postion to set it
+ * \param[in] pos at which position to set it
* \return true or false
*/
static bool
my_ttl = ldns_rr_ttl(rr);
}
/* When ttl is implicit, try to adhere to the rules as
- * much as posssible. (also for compatibility with bind)
+ * much as possible. (also for compatibility with bind)
* This was changed when fixing an issue with ZONEMD
* which hashes the TTL too.
*/